Analysis
-
max time kernel
189s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe
Resource
win10v2004-20221111-en
General
-
Target
b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe
-
Size
393KB
-
MD5
d8e24ed6148216dc24d09fb0d5efdae0
-
SHA1
63947fe36790eded7fc9bedbcc133db33fde10e5
-
SHA256
b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467
-
SHA512
1006886570e6fdc235330aa4d3a6736cdd6cc5ed4cfb7d4c11e15c4024676cc30b1e70b4c84a39439854b5359f4920c1fd4f4fdda99045c3b04598c07a466b4c
-
SSDEEP
12288:2g7dUmmLen1G6Lkjr7plWzuDRsVqya6zV0T:2g7dkenE6Qf7fpubaA4
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 580 F4D55F6500014973000B9D42B4EB2331.exe -
Deletes itself 1 IoCs
pid Process 580 F4D55F6500014973000B9D42B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 896 b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe 896 b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000B9D42B4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\F4D55F6500014973000B9D42B4EB2331 = "C:\\ProgramData\\F4D55F6500014973000B9D42B4EB2331\\F4D55F6500014973000B9D42B4EB2331.exe" F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 896 b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe 896 b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe 896 b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe 896 b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe 896 b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe 896 b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe 896 b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 580 F4D55F6500014973000B9D42B4EB2331.exe 580 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 896 wrote to memory of 580 896 b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe 28 PID 896 wrote to memory of 580 896 b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe 28 PID 896 wrote to memory of 580 896 b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe 28 PID 896 wrote to memory of 580 896 b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe"C:\Users\Admin\AppData\Local\Temp\b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:896 -
C:\ProgramData\F4D55F6500014973000B9D42B4EB2331\F4D55F6500014973000B9D42B4EB2331.exe"C:\ProgramData\F4D55F6500014973000B9D42B4EB2331\F4D55F6500014973000B9D42B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Deletes itself
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:580
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
393KB
MD5d8e24ed6148216dc24d09fb0d5efdae0
SHA163947fe36790eded7fc9bedbcc133db33fde10e5
SHA256b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467
SHA5121006886570e6fdc235330aa4d3a6736cdd6cc5ed4cfb7d4c11e15c4024676cc30b1e70b4c84a39439854b5359f4920c1fd4f4fdda99045c3b04598c07a466b4c
-
Filesize
393KB
MD5d8e24ed6148216dc24d09fb0d5efdae0
SHA163947fe36790eded7fc9bedbcc133db33fde10e5
SHA256b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467
SHA5121006886570e6fdc235330aa4d3a6736cdd6cc5ed4cfb7d4c11e15c4024676cc30b1e70b4c84a39439854b5359f4920c1fd4f4fdda99045c3b04598c07a466b4c
-
Filesize
393KB
MD5d8e24ed6148216dc24d09fb0d5efdae0
SHA163947fe36790eded7fc9bedbcc133db33fde10e5
SHA256b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467
SHA5121006886570e6fdc235330aa4d3a6736cdd6cc5ed4cfb7d4c11e15c4024676cc30b1e70b4c84a39439854b5359f4920c1fd4f4fdda99045c3b04598c07a466b4c
-
Filesize
393KB
MD5d8e24ed6148216dc24d09fb0d5efdae0
SHA163947fe36790eded7fc9bedbcc133db33fde10e5
SHA256b01c1ff23a43dd82f7de914efb688bdf579749356a411756b69bc492fef83467
SHA5121006886570e6fdc235330aa4d3a6736cdd6cc5ed4cfb7d4c11e15c4024676cc30b1e70b4c84a39439854b5359f4920c1fd4f4fdda99045c3b04598c07a466b4c